PC¼¼ÀÌÆÛ ºü¸¥ ¸Þ´º


 PC¼¼ÀÌÆÛ ¸Þ´º ¾È³»
PC¼¼ÀÌÆÛ È¨
·Î±×ÀÎ (À¯·á»ç¿ëÀÚ)
ÇÁ·Î±×·¥ ¼Ò°³
ÇÁ·Î±×·¥ °¡À̵å
 - ±¸¸Å¹æ¹ý
 - »óÇ°±Ç°áÁ¦
 - ÀÚµ¿°áÁ¦ Ãë¼Ò
 - °Ë»ç¤ýÄ¡·á¹æ¹ý
 - ȯ°æ¼³Á¤
 - ÆÄÀϺ¹¿ø
¾Ç¼ºÄÚµå? ¹ÙÀÌ·¯½º?
 - ¾Ç¼ºÄÚµå¶õ?
 - ¹ÙÀÌ·¯½º¶õ?
 - ºÒÇÊ¿äÇÑ Á¤º¸¶õ?
º¸¾ÈÁ¤º¸
 - º¸¾ÈÄ®·³
 - MSº¸¾È±Ç°í¹®
°í°´Áö¿ø
 - °øÁö»çÇ×
 - ÀǽɵǴ ÆÄÀϽŰí
 - ÀæÀº Áú¹®¤ý´äº¯
 - 1:1»ó´ã

¹ÙÀÌ·¯½º À̸§ Trojan-W32/Kates.18432 ¹ÙÀÌ·¯½º Á¾·ù Trojan
½ÇÇà ȯ°æ Windows Á¦ÀÛÁö ºÒºÐ¸í
¹ß°ßÀÏ 20091019 ¹ÙÀÌ·¯½ºÅ©±â 18432
¸ÞÀÏ Á¦¸ñ ¾øÀ½
÷ºÎÆÄÀÏ
¹ÙÀÌ·¯½º Áõ»ó

- ÆÄÀÏ»ý¼º

±âÁ¸ ÆÄÀÏ¿¡¼­ »óÀ§ Æú´õ¿¡ ·£´ýÆÄÀÏ.(dat, bak, tmp, old) È®ÀåÀÚÀÇ ÆÄÀÏÀ» »ý¼ºÇÕ´Ï´Ù.

- ·¹Áö½ºÆ®¸® »ý¼º

   HKEY_LOCAL_MACHINE

        \SOFTWARE

              \MICROSOFT

                    \WINDOWS NT

                           \CurrentVersion

                                \DRIVERS32

   "MIDI9 = »ý¼º°æ·Î ¹× ÆÄÀϸíÀº ·£´ý, ·£´ýÇÑ ÆĶó¹ÌÅÍ

 

 À§¿¡ ÀÛ¼ºÇÑ Å°°ªÀ¸·Î ÀÎÇØ ºÎÆà ½Ã ¾Ç¼ºÄڵ忡 ÀÇÇØ »ý¼ºµÈ DLLÆÄÀÏÀ» ·ÎµåÇÏ¿© ÇØ´ç ÆÄÀÏÀÌ

  Á¤»óÀûÀ¸·Î  ·ÎµùµÇÁö ¾Ê¾Æ¼­ ¹ß»ýÇÏ´Â ¹®Á¦ÀÔ´Ï´Ù.

   HKEY_LOCAL_MACHINE

       \SOFTWARE

             \MICROSOFT

                   \WINDOWS NT

                         \CurrentVersion

                               \Windows

     AppInit_DLLs="winmm.dll"¿Í LoadAppInit_DLLs = 0x1

     À» »ý¼ºÇÕ´Ï´Ù.

Ä¡·á ¹æ¹ý Åͺ¸¹é½Å Á¦Ç°±ºÀ¸·Î Áø´Ü/Ä¡·á °¡´ÉÇÕ´Ï´Ù.
Á÷Á¢Ä¡·á¹æ¹ý


< ¿¹¹æ >


1. Åͺ¸¹é½ÅAi, Åͺ¸¹é½Å Online, Åͺ¸¹é½Å 2001, , Åͺ¸¹é½ÅIS Á¦Ç°±ºÀ¸·Î Ä¡·á ¹× ¿¹¹æ°¡´ÉÇÕ´Ï´Ù.


2. À©µµ¿ì º¸¾È ÆÐÄ¡¸¦ Ç×»ó ÃֽŹöÀüÀ¸·Î ¾÷µ¥ÀÌÆ®ÇÕ´Ï´Ù.


¾Æ·¡ÀÇ ¾÷µ¥ÀÌÆ® ¸ñ·ÏÀº ÇØ´ç ¾Ç¼ºÄڵ尡 »ðÀÔµÈ À¥ÆäÀÌÁö¿¡¼­ ÀÌ¿ëÇÑ Ãë¾àÁ¡ ¸®½ºÆ® ÀÔ´Ï´Ù.


- MS Internet Explorer 7 Video ActiveX Remote Buffer Overflow Exploit (MS09-032)
(
http://www.microsoft.com/korea/technet/security/bulletin/MS06-014.mspx)


- Internet Explorer Uninitialized Memory Corruption Vulnerability (MS09-002)
(
http://www.microsoft.com/korea/technet/security/bulletin/MS09-002.mspx)


- Internet Explorer (MDAC) Remote Code Execution Exploit (MS06-014)
(
http://www.microsoft.com/korea/technet/security/bulletin/MS06-014.mspx)


- Microsoft Office Web Components (Spreadsheet) ActiveX BOF (MS09-043)
(http://www.microsoft.com/korea/technet/security/bulletin/ms09-043.mspx)


 



 


¼öµ¿Á¶Ä¡¹æ¹ý >


1. °¨¿°µÈ ½Ã½ºÅÛÀÇ Çϵåµð½ºÅ©¸¦ ´Ù¸¥ Á¤»ó ½Ã½ºÅÛÀÇ Slave·Î ¿¬°áÇÑ ÈÄ ºÎÆÃÇÑ´Ù.


2. Á¤»ó½Ã½ºÅÛ¿¡¼­ ·¹Áö½ºÆ®¸® ÆíÁý±â(regedit.exe)¸¦ ½ÇÇàÇÏ¿© HKEY_LOCAL_MACHINE


Å°¸¦ ¼±ÅÃÇÑ´Ù. 



 


3. ÆÄÀÏ(F) -> ÇÏÀÌºê ·Îµå(L)À» ¼±ÅÃÇϸé ÇÏÀÌºê ·ÎµåÇÒ ¼ö ÀÖ´Â À©µµ¿ì âÀÌ ¶á´Ù. 



 


4. °¨¿°µÈ ÇϵåÀÇ WINDOWS\system32\config ¿¡¼­ software ÆÄÀÏÀ» ¼±ÅÃÇÏ°í ¿­±â¸¦ Ŭ¸¯ÇÑ´Ù. 



 


5. Å° À̸§¿¡ ÀÓÀÇÀÇ Å°¸¦ ÀÔ·ÂÇÕ´Ï´Ù. 



 





  6. À§ÀÇ °úÁ¤À» ¸¶Ä¡¸é ºÎÆÃÀÌ ¾ÈµÇ´Â ½Ã½ºÅÛÀÇ ·¹Áö½ºÆ®¸® Á¤º¸°¡ ·ÎµùµÇ¾î Áø´Ù.


  ·ÎµùÀÌ µÇ¸é ¾Æ·¡ ·¹Áö½ºÆ®¸® °ªÀ» »èÁ¦ÇÑ´Ù. 
   HKEY_LOCAL_MACHINE\[
À§¿¡¼­ ÁöÁ¤ÇÑ ÀÓÀÇÀÇ À̸§]
       \MICROSOFT


\WINDOWS NT


      \CurrentVersion


           \DRIVERS32\
    "MIDI9 = »ý¼º°æ·Î ¹× ÆÄÀϸíÀº ·£´ý"


 
   7.
ÇÏÀÌºê ·Îµå½Ã ÀÔ·ÂÇÑ ÀÓÀÇÀÇ Å°(HKEY_LOCAL_MACHINE\Å° À̸§)¸¦ ¼±ÅÃÇÑ ÈÄ ÇÏÀÌºê ¾ð·Îµå


(ÆÄÀÏ¡æÇÏÀÌºê ¾ð·Îµå)¸¦ ÇÑ´Ù.


 


8. ¾ð·Îµå°¡ ¿Ï·áµÇ¸é ºÎÆÃÀÌ ¾ÈµÇ¾ú´ø ÄÄÇ»ÅÍ¿¡ Çϵåµð½ºÅ©¸¦ ¿¬°á ÇϽŠÈÄ Åͺ¸¹é½Å Á¦Ç°À» ÃֽŹöÀüÀ¸·Î


    ¾÷µ¥ÀÌÆ® ÇϽŠÈÄ °Ë»ç ¹× Ä¡·á¸¦ ÇÑ´Ù.